US20130262314A1 - Encrypted payment image - Google Patents

Encrypted payment image Download PDF

Info

Publication number
US20130262314A1
US20130262314A1 US13/434,938 US201213434938A US2013262314A1 US 20130262314 A1 US20130262314 A1 US 20130262314A1 US 201213434938 A US201213434938 A US 201213434938A US 2013262314 A1 US2013262314 A1 US 2013262314A1
Authority
US
United States
Prior art keywords
image
invoice
computing device
payment
display
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/434,938
Other versions
US10453105B2 (en
Inventor
David G. Butler
Kenneth K. Smith
Andrew Alegria
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ent Services Development Corp LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Priority to US13/434,938 priority Critical patent/US10453105B2/en
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SMITH, KENNETH K, ALEGRIA, ANDREW, BUTLER, DAVID G
Publication of US20130262314A1 publication Critical patent/US20130262314A1/en
Assigned to HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP reassignment HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Assigned to ENT. SERVICES DEVELOPMENT CORPORATION LP reassignment ENT. SERVICES DEVELOPMENT CORPORATION LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Priority to US16/558,795 priority patent/US20200051144A1/en
Application granted granted Critical
Publication of US10453105B2 publication Critical patent/US10453105B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/04Billing or invoicing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/047Payment circuits using payment protocols involving electronic receipts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G5/00Receipt-giving machines
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • a purchaser may authorize and authenticate a payment invoice to make a purchase at a retail location.
  • a retailer may provide a paper or digital receipt, and a purchaser may sign to indicate that the purchase is authorized and that the purchaser is authorized to use the selected payment method.
  • FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase.
  • FIG. 2 is a block diagram illustrating one example of a mobile computing device to encrypt a payment image.
  • FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image.
  • FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image.
  • FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device.
  • a retailer may request a signed receipt or invoice for a purchase as proof to a payment entity, such as bank or credit card company, that an authenticated purchaser authorized the purchase.
  • a purchaser may authorize and authenticate a purchase using a mobile device, such as a mobile device with a camera and display, by cryptographically signing an image of an invoice with payment account information.
  • a mobile device may capture an image of an invoice displayed on a retail computing device.
  • the mobile device may create a binary version of the image and encrypt the binary version with a secret key.
  • the secret key may be the purchaser's account number such that the secret key is also known by the payment entity with whom the account is held.
  • the mobile device may create a payment image from the encrypted binary and display the image.
  • the purchaser may scan the displayed payment image to a retail computing device using a scanner associated with the retailer, and the retailer may transmit the payment image of the encrypted binary version of the image to the payment entity to receive payment.
  • the payment entity may decrypt a binary version of the payment image using the account number key.
  • the decrypted binary may include the invoice information, such as the total amount due for payment, and the payment entity may issue payment based on the invoice information.
  • Making a purchase using an encrypted payment image may allow a mobile device without internet access that includes a camera and display to authorize and authenticate a purchase.
  • the image may be used to capture more transaction and encryption details that may be feasibly entered manually.
  • Paying with a digitally signed invoice may allow the retailer to receive payment without accessing a purchaser's account information, which may protect the purchaser in the event that the retailer is hacked or in cases where the retailer is an untrustworthy merchant.
  • a cryptographically signed invoice allows a payment entity to view invoice details after decrypting the signed invoice. The payment entity may use the invoice details, such as date and location of purchase, to prevent incorrect charges and duplicate charges.
  • a transaction between computing devices may decrease the use of paper receipts.
  • FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase.
  • a mobile computing device 100 may make a purchase from a retail computing device 101 using a payment account issued by a payment entity associated with a payment computing device 102 .
  • the mobile computing device 100 may be a tablet, mobile phone, or music player, and a user may bring the mobile computing device 100 to a retail location.
  • the mobile computing device 100 may or may not have network access.
  • the mobile computing device 100 is described in more detail in FIG. 2 .
  • the retail computing device 101 may be a computing device at a retail location for allowing a user to make a purchase.
  • the retail computing device 101 may be a kiosk that allows a user to scan an item for purchase, determines the item and total, and allows the user to pay for the item.
  • the retail computing device 101 may be a self-scanning lane in a retail location. In some cases, the purchase may be made outside of a retail setting, such as where a purchase is made from an individual.
  • the retail computing device 101 may be a personal computing device, such as a tablet, laptop, or mobile computing device communicating with a purchaser's device. The retail computing device 101 is described in more detail in FIG. 3 .
  • the payment computing device 102 may be a computing device associated with a payment entity, such as a credit card company or bank, that processes a payment. For example, the payment computing device 102 may verify a user account number and pay the retailer from the user account.
  • a payment entity such as a credit card company or bank
  • the mobile computing device 100 , retail computing device 101 , and payment computing device 102 may communicate to allow a purchase to be made from the mobile computing device 100 .
  • the retail computing device 101 may create an invoice including transaction information.
  • the retail computing device 101 may display the invoice such that a camera on the mobile computing device 100 captures an image of the invoice.
  • the invoice is displayed as a barcode.
  • the invoice may be a sequence of barcodes.
  • the mobile computing device 100 may create a binary version of the invoice and digitally sign the invoice with a secret key associated with a payment account.
  • the mobile computing device 100 may display an image of the cryptographically signed invoice, and a user may scan the image to the retail computing device 101 .
  • the mobile computing device 100 may format the cryptographically signed image for display, such as by creating a barcode or sequence of barcodes of the cryptographically signed image binary.
  • the mobile computing device 100 may cryptographically sign the image using an encryption key. For example, hash-based message authentication (HMAC) or public key infrastructure encryption may be used.
  • HMAC hash-based message authentication
  • public key infrastructure encryption may be used.
  • the retail computing device 101 may transmit the signed invoice to the payment computing device 102 .
  • the payment computing device 102 may decrypt the signed version of the invoice using the secret key and provide payment to the retailer from the user's account.
  • the retail computing device 101 creates a barcode of an invoice to display as the invoice image.
  • FIG. 2 is a block diagram illustrating one example of the mobile computing device 100 to encrypt a payment image.
  • the mobile computing device 100 from FIG. 1 may be used to create a cryptographically signed invoice image to be uploaded to the retailer computing device 101 as payment for a purchase from the retailer associated with the retail computing device 101 .
  • the mobile computing device 100 may include a processor 201 , a machine-readable storage medium 202 , a display 203 , and a camera 204 .
  • the display 203 may be a screen included within the mobile computing device 100 .
  • the display 203 may be a mobile phone screen.
  • the display 203 may be used to output information.
  • the display 203 may receive user input, such as through touch or gestures relative to the display 203 .
  • the camera 204 may be included within the mobile computing device 100 .
  • the camera 204 may capture pictures from the mobile computing device 100 to be displayed on the display 203 .
  • the view of the camera is shown on the display 203 as a user captures a picture.
  • the processor 201 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions.
  • the mobile computing device 100 includes logic instead of or in addition to the processor 201 .
  • the processor 201 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below.
  • the retail computing device 100 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality.
  • the machine-readable storage medium 202 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.).
  • the machine-readable storage medium 202 may be, for example, a computer readable non-transitory medium.
  • the machine-readable storage medium 202 may include payment information 207 .
  • the payment information 207 may be information used to encrypt an invoice.
  • the payment information 207 may include an encryption key that is a secret key also known by a financial entity associated with payment information.
  • the financial entity may use the payment information to decrypt information encrypted by the mobile computing device 100 .
  • a user may store the payment information 207 to be saved for future purchases or a user may enter and store the payment information 207 when a purchase is made.
  • the payment information 207 includes multiple encryption keys where each key is associated with a different account.
  • the mobile computing device 100 may generate a user interface to allow a user to select which account to use for a purchase.
  • the payment information 207 may include account information and an associated encryption key.
  • the payment information 207 may include information about a payment entity associated with the encryption key such that the information may be displayed to a user to allow the user to select an account for payment.
  • the machine-readable storage medium 202 may include instructions executable by the processor 201 .
  • the machine-readable storage 202 may include authentication instructions 205 and authorization instructions 206 .
  • the payment information 207 , authentication instructions 205 , and authorization instructions 206 may be stored in the same or separate storages.
  • the authentication instructions 205 may include instructions to authenticate an invoice by encrypting a binary version of an invoice using the payment information 207 .
  • the mobile computing device 100 may receive an image of an invoice and determine a binary version of the invoice image.
  • the mobile computing device 100 may cryptographically sign the invoice image with an encryption key stored in the payment information 207 .
  • the authorization instructions 206 may include instructions to authorize the invoice by displaying the authenticated invoice on the display 203 to be provided to a retailer. For example, an image of the encrypted invoice image may be displayed on the display 203 to provide it to a retailer. The cryptographically signed invoice image may indicate that the user authorizes the particular purchase details described in the invoice. The retail computing device 101 may capture an image of the display 203 to receive the authorized invoice.
  • FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image.
  • the retail computing device 101 from FIG. 1 may process payment information received from the mobile computing device 100 .
  • the retail computing device 101 may send transaction information to mobile computing device 100 and transmit payment information received from the mobile computing device 100 to a payment entity computing device, such as payment computing device 102 .
  • the retail computing device 102 may include a processor 301 , a machine-readable storage medium 302 , a display 303 , a scanner 304 , and a network interface 305 .
  • the display 303 may be a display to show transaction information to a user.
  • the display 303 may display information about items purchased and payment totals.
  • the display 303 may display an invoice related to a user's purchase.
  • the scanner 304 may be used to scan items for purchase. For example, a user may scan the barcode of an item to be purchased. In one implementation, the scanner 304 may scan a cryptographically signed payment image from a user's mobile device, such as the mobile computing device 100 .
  • the network interface 305 may allow the retail computing device 101 to communicate via a network, such as the Internet.
  • the retail computing device 102 may communicate with a payment entity, such as with payment computing device 102 , to receive payment for a transaction.
  • the processor 301 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions.
  • the retail computing device 101 includes logic instead of or in addition to the processor 301 .
  • the processor 301 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below.
  • the retail computing device 101 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality.
  • the machine-readable storage medium 302 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.).
  • the machine-readable storage medium 302 may be, for example, a computer readable non-transitory medium.
  • the machine-readable storage medium 302 may include instructions executable by the processor 301 .
  • the machine-readable storage medium 302 may include invoice display instructions 306 and payment image transmission instructions 307 .
  • the invoice display instructions 306 may include instructions to display invoice information on the display 303 .
  • the invoice display instructions 306 include instructions to create an invoice in a particular image format readable by the mobile computing device 100 .
  • the invoice display instructions 306 include instructions to encode invoice information in a barcode to be displayed on the display 303 .
  • the invoice display instructions 306 may include instructions to encode the invoice information in a halftone image, such as in a steganographic halftone image.
  • the mobile computing device 100 may capture an image of the display 303 of the invoice image.
  • the payment image transmission instructions 307 may include instructions to transmit payment information received from an image scanned by the scanner 304 to the payment computing device 102 via the network interface 304 .
  • a user may use the scanner 304 to scan the display 203 of the mobile computing device 100 .
  • the display 203 may display an image of a cryptographically signed version of the invoice image provided by the retail computing device 101 .
  • the retail computing device 101 may transmit the scanned image to the payment computing device 102 .
  • the retail computing device 101 may decode or format the scanned image prior to transmitting it to the payment computing device 102 .
  • the retail computing device 101 extracts information from the cryptographically signed image and transmits the extracted information to the payment computing device 102 .
  • the retail computing device 101 may decode a barcode and send the decoded information to the payment computing device 102 or the retail computing device 101 may use optical character recognition to interpret the characters of the cryptographically signed image and transmit the character values to the payment computing device 102 .
  • the retail computing device 101 may determine a binary version of the cryptographically signed image and transmit the binary version to the payment computing device 102 .
  • FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image.
  • a mobile computing device such as the mobile computing device 100 , may create an encrypted payment image to authenticate a purchase and provide the encrypted payment to a retail computing device to authorize a purchase.
  • the mobile computing device may cryptographically sign a binary version of an invoice image to provide payment information and authentication.
  • the method may be performed, for example, by the processor 201 of FIG. 1 .
  • a mobile computing device determines a binary version of an invoice image.
  • the invoice image may be an image for displaying transaction information.
  • the invoice may include information, such as payment total, items purchased, the retail entity name, purchaser name, and time of purchase.
  • the mobile computing device may receive the invoice image from a retailer.
  • the mobile computing device receives the invoice via RFID or Bluetooth.
  • a retailer displays the image invoice, and the mobile computing device captures an image of the invoice image.
  • a user may use a camera of the mobile computing device to capture the image of the invoice image displayed by the retail computing device.
  • the mobile computing device displays the invoice information. For example, a user may view the invoice information prior to authorizing the purchase.
  • the mobile computing device may parse or decode the invoice image and display the transaction information to a user.
  • the mobile computing device may capture an image of a barcode invoice image.
  • the mobile computing device may decode the barcode to determine the invoice information and display the invoice information.
  • the mobile computing device may generate a user interface allow the user to confirm the transaction details.
  • the user interface may allow a user to select to proceed with the transaction after viewing the transaction details. Displaying the details to the user may prevent a retailer from creating a non-human readable invoice image that includes incorrect purchase information.
  • the user may view the invoice details to provide authorization to the particular transaction details included in the invoice image.
  • the mobile computing device may determine the binary version of the invoice image.
  • the invoice image may be any suitable type of digital image.
  • the mobile computing device alters the image prior to determining the binary version.
  • the invoice image may be encoded or formatted in a particular manner readable by the mobile computing device.
  • the image may be a barcode image, a text image, or a steganographic halftone image of transaction information.
  • the image is displayed in a manner that the mobile computing device may decipher the contents using optical character recognition.
  • the mobile computing device may determine the ASCII binary of the text displayed in the invoice image.
  • the invoice image is a steganographic halftone image.
  • the invoice information image may be encoded by the placement of the pixels in the halftone image such that it may appear to be a solid color to the human eye.
  • the ASCII binary of the steganographic halftone image may be determined from the image without the use optical character recognition. For example, the retailer may display or print the binary version of the halftone image.
  • the mobile computing device signs the binary version of the invoice image cryptographically with payment account information.
  • the mobile computing device may encrypt the binary version of the invoice image using a secret cryptographic key.
  • the secret cryptographic key may be a shared secret key with a payment entity that is not shared with the retailer.
  • the mobile computing device may encrypt the binary using a hash-based message authentication code (HMAC).
  • HMAC hash-based message authentication code
  • the binary of the invoice image may be encrypted using a cryptographic hash function and a secret key where the secret key relates to payment information shared with the payment entity.
  • the secret key may be an account number, such as a credit card number, of an account held with the payment entity.
  • the mobile computing device may use public key infrastructure (PKI) encryption and a certificate authority to allow the mobile computing device to encrypt the invoice image in a manner that may be decrypted by a payment entity but not by a retailer.
  • PKI public key infrastructure
  • the invoice image binary may be encrypted such that the details provided in the invoice image represent the transaction details authorized by the user.
  • the mobile computing device displays an image of the cryptographically signed binary.
  • the mobile computing device may display an image of the cryptographically signed binary to provide the signed version of the invoice image back to the retailer.
  • the image may be displayed on a display associated with the mobile computing device in a manner that allows the image to be scanned by a scanner associated with a retail computing device.
  • the displayed image may be any suitable type of digital image.
  • the mobile computing device formats the cryptographically signed binary prior to displaying it. For example, the mobile computing device may format the cryptographically signed binary as a barcode image.
  • the mobile computing device formats the cryptographically signed binary as a halftone image, such as a steganographic halftone image.
  • a retail computing device may capture a payment image of the cryptographically signed binary displayed on the mobile device.
  • the retail computing device may capture the image through a camera or scanner.
  • a user may hold the mobile phone up to a scanner to allow the retail computing device to capture the image.
  • the invoice image may be cryptographically signed in a manner that the retail computing device may decrypt it to verify the purchaser.
  • the invoice image may be cryptographically signed in a manner that the retailer is unable to decrypt it, and the retailer may send the cryptographically signed version of the invoice to a payment entity without verifying its content.
  • the retail computing device may process the payment image to extract information to transmit to a payment computing device.
  • the retail computing device may use optical character recognition to determine the text content of the image.
  • the payment image is in the form of a barcode.
  • the retail computing device may decode the barcode image to determine a string of text and transmits the string of text to the payment computing device.
  • the retail computing device may transmit the image to the payment computing device without evaluating the payment image, and the payment computing device may perform additional processing.
  • the retail computing device may send an image of text without performing optical character recognition methods, and the payment computing device may perform an optical character recognition method to interpret the image.
  • the retail computing device transmits additional information to the payment computing device.
  • the retail computing device may transmit a customer name or identifier with the payment image such that the payment computing device may determine the decryption key associated with the particular customer.
  • the retail computing device may send another version of the invoice such that the payment computing device may compare the invoice received from the retailer and the encrypted version from the mobile computing device to determine that the purchase information is compatible.
  • the payment computing device may decrypt the cryptographically signed invoice image.
  • the successful decryption may indicate that the payment is authenticated.
  • the payment computing device may determine the authorized payment amount from the decrypted invoice.
  • the payment computing device may issue the determined payment amount to the retailer from an account associated with the particular customer or decryption key.
  • FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device.
  • the mobile computing device 500 and the retail computing device 501 may communicate payment information through a series of barcode images.
  • items are scanned for purchase. For example, a user may scan the barcodes of items to be purchased with a scanner associated with the retail computing device 501 .
  • the retail computing device 501 may create an invoice of the transaction.
  • the invoice may include the date, location, and contents of the purchase.
  • the retail computing device 501 may encode the invoice in a barcode format.
  • the retail computing device 501 displays the barcode of the invoice on a display associated with the retail computing device 501 .
  • the mobile computing device 500 takes a picture of the barcode invoice displayed by the retail computing device 501 .
  • the mobile computing device 500 determines a binary version of the barcode image captured by the mobile computing device 500 .
  • the mobile computing device 500 cryptographically signs the binary version of the invoice barcode image. The image may be signed using information related to a payment account as the cryptographic key.
  • the mobile computing device 500 generates a barcode image of the cryptographically signed image.
  • the mobile computing device 500 displays the barcode of the cryptographically signed image on a display associated with the mobile computing device 500 .
  • the retail computing device 501 scans the barcode.
  • a user may use a scanner associated with the retail computing device 501 to scan the barcode displayed on the mobile computing device 500 .
  • the retail computing device 501 transmits information about the barcode to a payment entity.
  • the payment entity may decrypt the image binary and provide payment to the retailer for the transaction in the amount included on the cryptographically signed invoice.

Abstract

Embodiments disclosed herein relate to an encrypted payment image. In one embodiment, a processor of a mobile computing device encrypts a binary version of an invoice image with a payment information encryption key. The processor may generate a payment image of the encrypted binary of the invoice image and display the payment image.

Description

    BACKGROUND
  • A purchaser may authorize and authenticate a payment invoice to make a purchase at a retail location. For example, a retailer may provide a paper or digital receipt, and a purchaser may sign to indicate that the purchase is authorized and that the purchaser is authorized to use the selected payment method.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The drawings describe example embodiments. The following detailed description references the drawings, wherein:
  • FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase.
  • FIG. 2 is a block diagram illustrating one example of a mobile computing device to encrypt a payment image.
  • FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image.
  • FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image.
  • FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device.
  • DETAILED DESCRIPTION
  • A retailer may request a signed receipt or invoice for a purchase as proof to a payment entity, such as bank or credit card company, that an authenticated purchaser authorized the purchase. In one implementation, a purchaser may authorize and authenticate a purchase using a mobile device, such as a mobile device with a camera and display, by cryptographically signing an image of an invoice with payment account information.
  • As an example, a mobile device may capture an image of an invoice displayed on a retail computing device. The mobile device may create a binary version of the image and encrypt the binary version with a secret key. The secret key may be the purchaser's account number such that the secret key is also known by the payment entity with whom the account is held. The mobile device may create a payment image from the encrypted binary and display the image. The purchaser may scan the displayed payment image to a retail computing device using a scanner associated with the retailer, and the retailer may transmit the payment image of the encrypted binary version of the image to the payment entity to receive payment. The payment entity may decrypt a binary version of the payment image using the account number key. The decrypted binary may include the invoice information, such as the total amount due for payment, and the payment entity may issue payment based on the invoice information.
  • Making a purchase using an encrypted payment image may allow a mobile device without internet access that includes a camera and display to authorize and authenticate a purchase. The image may be used to capture more transaction and encryption details that may be feasibly entered manually. Paying with a digitally signed invoice may allow the retailer to receive payment without accessing a purchaser's account information, which may protect the purchaser in the event that the retailer is hacked or in cases where the retailer is an untrustworthy merchant. A cryptographically signed invoice allows a payment entity to view invoice details after decrypting the signed invoice. The payment entity may use the invoice details, such as date and location of purchase, to prevent incorrect charges and duplicate charges. A transaction between computing devices may decrease the use of paper receipts.
  • FIG. 1 is a diagram illustrating one example of communications to allow a mobile device to authorize and authenticate a purchase. For example, a mobile computing device 100 may make a purchase from a retail computing device 101 using a payment account issued by a payment entity associated with a payment computing device 102.
  • The mobile computing device 100 may be a tablet, mobile phone, or music player, and a user may bring the mobile computing device 100 to a retail location. The mobile computing device 100 may or may not have network access. The mobile computing device 100 is described in more detail in FIG. 2.
  • The retail computing device 101 may be a computing device at a retail location for allowing a user to make a purchase. For example, the retail computing device 101 may be a kiosk that allows a user to scan an item for purchase, determines the item and total, and allows the user to pay for the item. The retail computing device 101 may be a self-scanning lane in a retail location. In some cases, the purchase may be made outside of a retail setting, such as where a purchase is made from an individual. For example, the retail computing device 101 may be a personal computing device, such as a tablet, laptop, or mobile computing device communicating with a purchaser's device. The retail computing device 101 is described in more detail in FIG. 3.
  • The payment computing device 102 may be a computing device associated with a payment entity, such as a credit card company or bank, that processes a payment. For example, the payment computing device 102 may verify a user account number and pay the retailer from the user account.
  • The mobile computing device 100, retail computing device 101, and payment computing device 102 may communicate to allow a purchase to be made from the mobile computing device 100. For example, the retail computing device 101 may create an invoice including transaction information. The retail computing device 101 may display the invoice such that a camera on the mobile computing device 100 captures an image of the invoice. In one implementation, the invoice is displayed as a barcode. The invoice may be a sequence of barcodes. The mobile computing device 100 may create a binary version of the invoice and digitally sign the invoice with a secret key associated with a payment account. The mobile computing device 100 may display an image of the cryptographically signed invoice, and a user may scan the image to the retail computing device 101. The mobile computing device 100 may format the cryptographically signed image for display, such as by creating a barcode or sequence of barcodes of the cryptographically signed image binary. The mobile computing device 100 may cryptographically sign the image using an encryption key. For example, hash-based message authentication (HMAC) or public key infrastructure encryption may be used.
  • The retail computing device 101 may transmit the signed invoice to the payment computing device 102. The payment computing device 102 may decrypt the signed version of the invoice using the secret key and provide payment to the retailer from the user's account. In one implementation, the retail computing device 101 creates a barcode of an invoice to display as the invoice image.
  • FIG. 2 is a block diagram illustrating one example of the mobile computing device 100 to encrypt a payment image. For example, the mobile computing device 100 from FIG. 1 may be used to create a cryptographically signed invoice image to be uploaded to the retailer computing device 101 as payment for a purchase from the retailer associated with the retail computing device 101. The mobile computing device 100 may include a processor 201, a machine-readable storage medium 202, a display 203, and a camera 204.
  • The display 203 may be a screen included within the mobile computing device 100. For example, the display 203 may be a mobile phone screen. The display 203 may be used to output information. In some implementations, the display 203 may receive user input, such as through touch or gestures relative to the display 203.
  • The camera 204 may be included within the mobile computing device 100. For example, the camera 204 may capture pictures from the mobile computing device 100 to be displayed on the display 203. In one implementation, the view of the camera is shown on the display 203 as a user captures a picture.
  • The processor 201 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions. In one embodiment, the mobile computing device 100 includes logic instead of or in addition to the processor 201. As an alternative or in addition to fetching, decoding, and executing instructions, the processor 201 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below. In one implementation, the retail computing device 100 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality.
  • The machine-readable storage medium 202 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.). The machine-readable storage medium 202 may be, for example, a computer readable non-transitory medium.
  • The machine-readable storage medium 202 may include payment information 207. The payment information 207 may be information used to encrypt an invoice. For example, the payment information 207 may include an encryption key that is a secret key also known by a financial entity associated with payment information. The financial entity may use the payment information to decrypt information encrypted by the mobile computing device 100. A user may store the payment information 207 to be saved for future purchases or a user may enter and store the payment information 207 when a purchase is made. In one implementation, the payment information 207 includes multiple encryption keys where each key is associated with a different account. The mobile computing device 100 may generate a user interface to allow a user to select which account to use for a purchase. The payment information 207 may include account information and an associated encryption key. For example, the payment information 207 may include information about a payment entity associated with the encryption key such that the information may be displayed to a user to allow the user to select an account for payment.
  • The machine-readable storage medium 202 may include instructions executable by the processor 201. For example, the machine-readable storage 202 may include authentication instructions 205 and authorization instructions 206. The payment information 207, authentication instructions 205, and authorization instructions 206 may be stored in the same or separate storages.
  • The authentication instructions 205 may include instructions to authenticate an invoice by encrypting a binary version of an invoice using the payment information 207. For example, the mobile computing device 100 may receive an image of an invoice and determine a binary version of the invoice image. The mobile computing device 100 may cryptographically sign the invoice image with an encryption key stored in the payment information 207.
  • The authorization instructions 206 may include instructions to authorize the invoice by displaying the authenticated invoice on the display 203 to be provided to a retailer. For example, an image of the encrypted invoice image may be displayed on the display 203 to provide it to a retailer. The cryptographically signed invoice image may indicate that the user authorizes the particular purchase details described in the invoice. The retail computing device 101 may capture an image of the display 203 to receive the authorized invoice.
  • FIG. 3 is a block diagram illustrating one example of a retail computing device to receive payment from a cryptographically signed invoice image. For example, the retail computing device 101 from FIG. 1 may process payment information received from the mobile computing device 100. The retail computing device 101 may send transaction information to mobile computing device 100 and transmit payment information received from the mobile computing device 100 to a payment entity computing device, such as payment computing device 102. The retail computing device 102 may include a processor 301, a machine-readable storage medium 302, a display 303, a scanner 304, and a network interface 305.
  • The display 303 may be a display to show transaction information to a user. For example, the display 303 may display information about items purchased and payment totals. The display 303 may display an invoice related to a user's purchase.
  • The scanner 304 may be used to scan items for purchase. For example, a user may scan the barcode of an item to be purchased. In one implementation, the scanner 304 may scan a cryptographically signed payment image from a user's mobile device, such as the mobile computing device 100.
  • The network interface 305 may allow the retail computing device 101 to communicate via a network, such as the Internet. For example, the retail computing device 102 may communicate with a payment entity, such as with payment computing device 102, to receive payment for a transaction.
  • The processor 301 may be any suitable processor, such as a central processing unit (CPU), a semiconductor-based microprocessor, or any other device suitable for retrieval and execution of instructions. In one embodiment, the retail computing device 101 includes logic instead of or in addition to the processor 301. As an alternative or in addition to fetching, decoding, and executing instructions, the processor 301 may include one or more integrated circuits (ICs) or other electronic circuits that comprise a plurality of electronic components for performing the functionality described below. In one implementation, the retail computing device 101 includes multiple processors. For example, one processor may perform some functionality and another processor may perform other functionality.
  • The machine-readable storage medium 302 may be any suitable machine readable medium, such as an electronic, magnetic, optical, or other physical storage device that stores executable instructions or other data (e.g., a hard disk drive, random access memory, flash memory, etc.). The machine-readable storage medium 302 may be, for example, a computer readable non-transitory medium.
  • The machine-readable storage medium 302 may include instructions executable by the processor 301. For example, the machine-readable storage medium 302 may include invoice display instructions 306 and payment image transmission instructions 307.
  • The invoice display instructions 306 may include instructions to display invoice information on the display 303. In one implementation, the invoice display instructions 306 include instructions to create an invoice in a particular image format readable by the mobile computing device 100. For example, the invoice display instructions 306 include instructions to encode invoice information in a barcode to be displayed on the display 303. The invoice display instructions 306 may include instructions to encode the invoice information in a halftone image, such as in a steganographic halftone image. The mobile computing device 100 may capture an image of the display 303 of the invoice image.
  • The payment image transmission instructions 307 may include instructions to transmit payment information received from an image scanned by the scanner 304 to the payment computing device 102 via the network interface 304. For example, a user may use the scanner 304 to scan the display 203 of the mobile computing device 100. The display 203 may display an image of a cryptographically signed version of the invoice image provided by the retail computing device 101. The retail computing device 101 may transmit the scanned image to the payment computing device 102.
  • The retail computing device 101 may decode or format the scanned image prior to transmitting it to the payment computing device 102. In one implementation, the retail computing device 101 extracts information from the cryptographically signed image and transmits the extracted information to the payment computing device 102. For example, the retail computing device 101 may decode a barcode and send the decoded information to the payment computing device 102 or the retail computing device 101 may use optical character recognition to interpret the characters of the cryptographically signed image and transmit the character values to the payment computing device 102. The retail computing device 101 may determine a binary version of the cryptographically signed image and transmit the binary version to the payment computing device 102.
  • FIG. 4 is a flow chart illustrating one example of a method to encrypt a payment image. A mobile computing device, such as the mobile computing device 100, may create an encrypted payment image to authenticate a purchase and provide the encrypted payment to a retail computing device to authorize a purchase. The mobile computing device may cryptographically sign a binary version of an invoice image to provide payment information and authentication. The method may be performed, for example, by the processor 201 of FIG. 1.
  • Beginning at 400, a mobile computing device, such as the mobile computing device 100, determines a binary version of an invoice image. The invoice image may be an image for displaying transaction information. The invoice may include information, such as payment total, items purchased, the retail entity name, purchaser name, and time of purchase.
  • The mobile computing device may receive the invoice image from a retailer. In one implementation, the mobile computing device receives the invoice via RFID or Bluetooth. In one implementation, a retailer displays the image invoice, and the mobile computing device captures an image of the invoice image. For example, a user may use a camera of the mobile computing device to capture the image of the invoice image displayed by the retail computing device.
  • In one implementation, the mobile computing device displays the invoice information. For example, a user may view the invoice information prior to authorizing the purchase. The mobile computing device may parse or decode the invoice image and display the transaction information to a user. As an example, the mobile computing device may capture an image of a barcode invoice image. The mobile computing device may decode the barcode to determine the invoice information and display the invoice information.
  • The mobile computing device may generate a user interface allow the user to confirm the transaction details. For example, the user interface may allow a user to select to proceed with the transaction after viewing the transaction details. Displaying the details to the user may prevent a retailer from creating a non-human readable invoice image that includes incorrect purchase information. The user may view the invoice details to provide authorization to the particular transaction details included in the invoice image.
  • The mobile computing device may determine the binary version of the invoice image. The invoice image may be any suitable type of digital image. In one implementation, the mobile computing device alters the image prior to determining the binary version. The invoice image may be encoded or formatted in a particular manner readable by the mobile computing device. For example, the image may be a barcode image, a text image, or a steganographic halftone image of transaction information. In one implementation, the image is displayed in a manner that the mobile computing device may decipher the contents using optical character recognition. For example, the mobile computing device may determine the ASCII binary of the text displayed in the invoice image. In one implementation, the invoice image is a steganographic halftone image. The invoice information image may be encoded by the placement of the pixels in the halftone image such that it may appear to be a solid color to the human eye. The ASCII binary of the steganographic halftone image may be determined from the image without the use optical character recognition. For example, the retailer may display or print the binary version of the halftone image.
  • Continuing to 401, the mobile computing device signs the binary version of the invoice image cryptographically with payment account information. For example, the mobile computing device may encrypt the binary version of the invoice image using a secret cryptographic key. The secret cryptographic key may be a shared secret key with a payment entity that is not shared with the retailer. The mobile computing device may encrypt the binary using a hash-based message authentication code (HMAC). For example, the binary of the invoice image may be encrypted using a cryptographic hash function and a secret key where the secret key relates to payment information shared with the payment entity. The secret key may be an account number, such as a credit card number, of an account held with the payment entity. In one implementation, the mobile computing device may use public key infrastructure (PKI) encryption and a certificate authority to allow the mobile computing device to encrypt the invoice image in a manner that may be decrypted by a payment entity but not by a retailer. The invoice image binary may be encrypted such that the details provided in the invoice image represent the transaction details authorized by the user.
  • Proceeding to 402, the mobile computing device displays an image of the cryptographically signed binary. The mobile computing device may display an image of the cryptographically signed binary to provide the signed version of the invoice image back to the retailer. The image may be displayed on a display associated with the mobile computing device in a manner that allows the image to be scanned by a scanner associated with a retail computing device. The displayed image may be any suitable type of digital image. In one implementation, the mobile computing device formats the cryptographically signed binary prior to displaying it. For example, the mobile computing device may format the cryptographically signed binary as a barcode image. In one implementation, the mobile computing device formats the cryptographically signed binary as a halftone image, such as a steganographic halftone image.
  • A retail computing device may capture a payment image of the cryptographically signed binary displayed on the mobile device. The retail computing device may capture the image through a camera or scanner. A user may hold the mobile phone up to a scanner to allow the retail computing device to capture the image. In some implementations, the invoice image may be cryptographically signed in a manner that the retail computing device may decrypt it to verify the purchaser. In some implementations, the invoice image may be cryptographically signed in a manner that the retailer is unable to decrypt it, and the retailer may send the cryptographically signed version of the invoice to a payment entity without verifying its content.
  • The retail computing device may process the payment image to extract information to transmit to a payment computing device. For example, the retail computing device may use optical character recognition to determine the text content of the image. In one implementation, the payment image is in the form of a barcode. The retail computing device may decode the barcode image to determine a string of text and transmits the string of text to the payment computing device. The retail computing device may transmit the image to the payment computing device without evaluating the payment image, and the payment computing device may perform additional processing. For example, the retail computing device may send an image of text without performing optical character recognition methods, and the payment computing device may perform an optical character recognition method to interpret the image.
  • In one implementation, the retail computing device transmits additional information to the payment computing device. For example, the retail computing device may transmit a customer name or identifier with the payment image such that the payment computing device may determine the decryption key associated with the particular customer. The retail computing device may send another version of the invoice such that the payment computing device may compare the invoice received from the retailer and the encrypted version from the mobile computing device to determine that the purchase information is compatible.
  • The payment computing device may decrypt the cryptographically signed invoice image. The successful decryption may indicate that the payment is authenticated. The payment computing device may determine the authorized payment amount from the decrypted invoice. The payment computing device may issue the determined payment amount to the retailer from an account associated with the particular customer or decryption key.
  • FIG. 5 is a diagram illustrating one example of a purchase performed by a mobile computing device communicating an encrypted invoice image to a retail computing device. The mobile computing device 500 and the retail computing device 501 may communicate payment information through a series of barcode images. At 502, items are scanned for purchase. For example, a user may scan the barcodes of items to be purchased with a scanner associated with the retail computing device 501. The retail computing device 501 may create an invoice of the transaction. The invoice may include the date, location, and contents of the purchase. The retail computing device 501 may encode the invoice in a barcode format. At 503, the retail computing device 501 displays the barcode of the invoice on a display associated with the retail computing device 501.
  • At 504, the mobile computing device 500 takes a picture of the barcode invoice displayed by the retail computing device 501. At 505, the mobile computing device 500 determines a binary version of the barcode image captured by the mobile computing device 500. At 506, the mobile computing device 500 cryptographically signs the binary version of the invoice barcode image. The image may be signed using information related to a payment account as the cryptographic key. At 507, the mobile computing device 500 generates a barcode image of the cryptographically signed image. At 580, the mobile computing device 500 displays the barcode of the cryptographically signed image on a display associated with the mobile computing device 500.
  • At 509, the retail computing device 501 scans the barcode. A user may use a scanner associated with the retail computing device 501 to scan the barcode displayed on the mobile computing device 500. At 511, the retail computing device 501 transmits information about the barcode to a payment entity. The payment entity may decrypt the image binary and provide payment to the retailer for the transaction in the amount included on the cryptographically signed invoice.

Claims (15)

1. A mobile device, comprising:
a camera to capture an invoice image;
a storage to store payment account information;
a display;
a computer-readable non-transitory storage medium comprising instructions to:
authenticate an invoice by encrypting a binary version of the invoice image using the payment account information as an encryption key; and
authorize the invoice by displaying on the display an image of the encrypted binary version of the invoice image; and
a processor to execute the instructions stored in the computer-readable non-transitory storage medium.
2. The mobile device of claim 1, wherein the invoice image comprises at least one of: a barcode, text, or halftone image.
3. The mobile device of claim 1, wherein instructions to display an image of the encrypted binary version of the invoice image comprise instructions to display a barcode image of the encrypted binary version of the invoice image.
4. The mobile device of claim 1, wherein the computer-readable non-transitory storage medium further comprises instructions to:
decode retail transaction information within the invoice image; and
display the retail transaction image on the display.
5. The mobile device of claim 1, wherein instructions to authenticate the invoice comprise instructions to authenticate the invoice using a hash-based message authentication code.
6. A method, comprising:
determining, by a mobile computing device, a binary version of an invoice image;
signing, by the mobile computing device, the binary version of the invoice image cryptographically with a payment account encryption key; and
displaying, by the mobile computing device, an image of the cryptographically signed binary version of the invoice image.
7. The method of claim 6, wherein displaying an image of the signed invoice image comprises displaying at least one of a barcode, text, or halftone image.
8. The method of claim 6, wherein determining a binary version of an invoice image comprises determining a binary version of an invoice barcode image.
9. The method of claim 6, further comprising transmitting, by a retail computing device, the displayed image to a payment entity.
10. The method of claim 6, further comprising:
determining, by the mobile computing device, transaction information from the invoice image; and
generating, by the mobile computing device, a user interface to display the transaction information.
11. A machine-readable non-transitory storage medium of a mobile computing device comprising instructions executable by a processor to:
generate a binary version of an invoice image;
encrypt the binary version of the invoice message with an encryption key associated with payment account information; and
display the encrypted version of the invoice image.
12. The machine-readable non-transitory storage medium of claim 11, further comprising instructions to:
determine transaction information from the invoice image; and
display the transaction information.
13. The machine-readable non-transitory storage medium of claim 11, wherein the payment image comprises at least one of a barcode, text, or halftone image.
14. The machine-readable non-transitory storage medium of claim 11, further comprising instructions to capture the invoice image.
15. The machine-readable non-transitory storage medium of claim 11, wherein instructions to encrypt the binary version of the invoice image comprise instructions to encrypt the payment information using at least one of: hash-based message authentication code encryption or public key infrastructure encryption.
US13/434,938 2012-03-30 2012-03-30 Encrypted payment image Active 2035-03-11 US10453105B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/434,938 US10453105B2 (en) 2012-03-30 2012-03-30 Encrypted payment image
US16/558,795 US20200051144A1 (en) 2012-03-30 2019-09-03 Encrypted payment image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/434,938 US10453105B2 (en) 2012-03-30 2012-03-30 Encrypted payment image

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/558,795 Division US20200051144A1 (en) 2012-03-30 2019-09-03 Encrypted payment image

Publications (2)

Publication Number Publication Date
US20130262314A1 true US20130262314A1 (en) 2013-10-03
US10453105B2 US10453105B2 (en) 2019-10-22

Family

ID=49236351

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/434,938 Active 2035-03-11 US10453105B2 (en) 2012-03-30 2012-03-30 Encrypted payment image
US16/558,795 Abandoned US20200051144A1 (en) 2012-03-30 2019-09-03 Encrypted payment image

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/558,795 Abandoned US20200051144A1 (en) 2012-03-30 2019-09-03 Encrypted payment image

Country Status (1)

Country Link
US (2) US10453105B2 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140136418A1 (en) * 2011-09-29 2014-05-15 Pacid Technologies, Llc System and method for application security
US20150100668A1 (en) * 2013-10-04 2015-04-09 Samsung Electronics Co., Ltd. Method and apparatus for content verification
US20150104006A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for handling image capture devices and captured images
US20150348033A1 (en) * 2012-12-21 2015-12-03 Leon Johannes Brits Secure Payments Using Portable Communication Devices and Two Dimensional Codes
US9558680B2 (en) 2014-04-04 2017-01-31 Sizhe Tan Payload in picture encoding
EP3108425A4 (en) * 2014-02-21 2017-10-18 Visa International Service Association System and method for transmitting and receiving transaction information
US9799036B2 (en) 2013-10-10 2017-10-24 Elwha Llc Devices, methods, and systems for managing representations of entities through use of privacy indicators
US10102543B2 (en) 2013-10-10 2018-10-16 Elwha Llc Methods, systems, and devices for handling inserted data into captured images
US10185841B2 (en) 2013-10-10 2019-01-22 Elwha Llc Devices, methods, and systems for managing representations of entities through use of privacy beacons
US10346624B2 (en) 2013-10-10 2019-07-09 Elwha Llc Methods, systems, and devices for obscuring entities depicted in captured images
US10410196B1 (en) * 2013-11-29 2019-09-10 Intuit Inc. System and method to enable payment using mark generation and mobile device
US10834290B2 (en) 2013-10-10 2020-11-10 Elwha Llc Methods, systems, and devices for delivering image data from captured images to devices
US11132674B2 (en) 2015-03-04 2021-09-28 Sizhe Tan Micro trusted network
US20210377309A1 (en) * 2020-06-02 2021-12-02 Hid Global Cid Sas System and method for establishing secure session with online disambiguation data

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11062297B2 (en) * 2018-10-29 2021-07-13 7-Eleven, Inc. Validation using key pairs and interprocess communications

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5841555A (en) * 1993-08-31 1998-11-24 Control Module Inc. Secure optical identification method and means
US20070022058A1 (en) * 2002-08-08 2007-01-25 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
US20110264586A1 (en) * 2010-02-11 2011-10-27 Cimbal Inc. System and method for multipath contactless transactions
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
US20120209749A1 (en) * 2011-02-16 2012-08-16 Ayman Hammad Snap mobile payment apparatuses, methods and systems
US20120230577A1 (en) * 2011-03-08 2012-09-13 Bank Of America Corporation Recognizing financial document images
US20140337175A1 (en) * 2011-02-22 2014-11-13 Visa International Service Association Universal Electronic Payment Apparatuses, Methods and Systems

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1917621A4 (en) 2005-07-15 2010-10-27 Revolution Money Inc System and method for user selection of fraud detection rules
US20090254479A1 (en) 2008-04-02 2009-10-08 Pharris Dennis J Transaction server configured to authorize payment transactions using mobile telephone devices
US9501773B2 (en) 2010-02-02 2016-11-22 Xia Dai Secured transaction system
US8380177B2 (en) 2010-04-09 2013-02-19 Paydiant, Inc. Mobile phone payment processing methods and systems
US8924712B2 (en) * 2011-11-14 2014-12-30 Ca, Inc. Using QR codes for authenticating users to ATMs and other secure machines for cardless transactions

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5841555A (en) * 1993-08-31 1998-11-24 Control Module Inc. Secure optical identification method and means
US20070022058A1 (en) * 2002-08-08 2007-01-25 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
US7784684B2 (en) * 2002-08-08 2010-08-31 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
US20110264586A1 (en) * 2010-02-11 2011-10-27 Cimbal Inc. System and method for multipath contactless transactions
US20120209749A1 (en) * 2011-02-16 2012-08-16 Ayman Hammad Snap mobile payment apparatuses, methods and systems
US20140337175A1 (en) * 2011-02-22 2014-11-13 Visa International Service Association Universal Electronic Payment Apparatuses, Methods and Systems
US20120230577A1 (en) * 2011-03-08 2012-09-13 Bank Of America Corporation Recognizing financial document images

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140236835A1 (en) * 2011-09-29 2014-08-21 Pacid Technologies, Llc System and method for application security
US20140136418A1 (en) * 2011-09-29 2014-05-15 Pacid Technologies, Llc System and method for application security
US20150348033A1 (en) * 2012-12-21 2015-12-03 Leon Johannes Brits Secure Payments Using Portable Communication Devices and Two Dimensional Codes
US20150100668A1 (en) * 2013-10-04 2015-04-09 Samsung Electronics Co., Ltd. Method and apparatus for content verification
US10013564B2 (en) * 2013-10-10 2018-07-03 Elwha Llc Methods, systems, and devices for handling image capture devices and captured images
US10289863B2 (en) 2013-10-10 2019-05-14 Elwha Llc Devices, methods, and systems for managing representations of entities through use of privacy beacons
US10834290B2 (en) 2013-10-10 2020-11-10 Elwha Llc Methods, systems, and devices for delivering image data from captured images to devices
US9799036B2 (en) 2013-10-10 2017-10-24 Elwha Llc Devices, methods, and systems for managing representations of entities through use of privacy indicators
US20150104006A1 (en) * 2013-10-10 2015-04-16 Elwha Llc Methods, systems, and devices for handling image capture devices and captured images
US10102543B2 (en) 2013-10-10 2018-10-16 Elwha Llc Methods, systems, and devices for handling inserted data into captured images
US10185841B2 (en) 2013-10-10 2019-01-22 Elwha Llc Devices, methods, and systems for managing representations of entities through use of privacy beacons
US10346624B2 (en) 2013-10-10 2019-07-09 Elwha Llc Methods, systems, and devices for obscuring entities depicted in captured images
US10410196B1 (en) * 2013-11-29 2019-09-10 Intuit Inc. System and method to enable payment using mark generation and mobile device
US11321691B2 (en) 2013-11-29 2022-05-03 Intuit Inc. System and method to enable payment using mark generation and mobile device
EP3108425A4 (en) * 2014-02-21 2017-10-18 Visa International Service Association System and method for transmitting and receiving transaction information
US9558680B2 (en) 2014-04-04 2017-01-31 Sizhe Tan Payload in picture encoding
US11132674B2 (en) 2015-03-04 2021-09-28 Sizhe Tan Micro trusted network
US20210377309A1 (en) * 2020-06-02 2021-12-02 Hid Global Cid Sas System and method for establishing secure session with online disambiguation data

Also Published As

Publication number Publication date
US20200051144A1 (en) 2020-02-13
US10453105B2 (en) 2019-10-22

Similar Documents

Publication Publication Date Title
US20200051144A1 (en) Encrypted payment image
US11868997B2 (en) Secure payments using a mobile wallet application
JP5592477B2 (en) Personal authentication system and method using mobile device
US20200151717A1 (en) Event access with data field encryption for validation and access control
US9800408B2 (en) Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
US20140100973A1 (en) Smartphone virtual payment card
CN107210918A (en) Use the token and password of transaction-specific information
US20150339886A1 (en) Encrypted electronic gaming ticket
CN104126292A (en) Strong authentication token with visual output of pki signatures
US10395232B2 (en) Methods for enabling mobile payments
AU2014342209B2 (en) Cryptographic watermarking of content in fuel dispensing environments
KR20130009890A (en) The security online payment system and those methods based on two dimensions code scanning with a device containing encrypted payment authentication information
TW201342118A (en) Mobile authentication for enabling host device functions
US11631062B2 (en) Voucher verification auxiliary device, voucher verification auxiliary system, and voucher verification auxiliary method
US20120310756A1 (en) System and method for displaying user's signature on pos terminals
TWI677842B (en) System for assisting a financial card holder in setting password for the first time and method thereof
JP2006243984A (en) Authentication device built in portable terminal, authentication program for portable terminal, recording medium thereof, and authentication method using portable terminal
CN116192469A (en) Security anti-theft method for electronic card transaction or transmission
JP2023006478A (en) Information processing device, user terminal, user medium, authentication method, authenticated method, and computer program
KR20230071990A (en) Code-based simple payment system
EP3116159A1 (en) Method and apparatus for securing data transmission
KR20160135409A (en) System and method for issuing electronic receipts
AU2014202432A1 (en) Payment Transaction Techniques

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BUTLER, DAVID G;SMITH, KENNETH K;ALEGRIA, ANDREW;SIGNING DATES FROM 20120327 TO 20120409;REEL/FRAME:028068/0673

AS Assignment

Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001

Effective date: 20151027

AS Assignment

Owner name: ENT. SERVICES DEVELOPMENT CORPORATION LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP;REEL/FRAME:041041/0716

Effective date: 20161201

STCV Information on status: appeal procedure

Free format text: BOARD OF APPEALS DECISION RENDERED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4